CIO Network: Is Android Secure?

1/15/2013 3:16PM

Android Founder Rich Miner of Google Ventures answers questions about corporate security on Android and talks about new applications allowing IT departments to create virtual phones on their user's Android devices.

This transcript has been automatically generated and may not be 100% accurate.

... I ... I'm CSO on line recently to the store am a brain scan for a third for the enterprise in terms of security after an ILS is first ... and second ... I think alot and alot of our ... audience members might have some concerns about now where ... you know and and and proliferation of malware which is inevitable as any ... I'm any device becomes more popular too ... but also the applications and in Google Play and I they say if you know are they ... from two ... to two problems ... yet I mean so look I think you know where they're snapping Google Play War I O s enough I'm in enterprise person the Manganello my ... of my employees to be putting very sensitive information on to that device ... I think I wanna understand it the information control where that information this is going and what can actually see that information and access it so ... independent of the plethora of apps and we can ensure that all the stops in either of these platforms ... are gonna be sick share ... sort of and are starting to see ... again a little bit more familiar with the tools on the intricacy is a little bit easier to some of these things ... but people are delivering great bucket Tyson fireman's to give you a very protected environment on top of the Android ... that enables you to pout ... um um manage effect new perch will manage file ... to the trend that we're seeing and I'm sure you're all seeing is ... people are walking in with their existing phone or tablet device ... and are saying look very gotten ... big smartphone ... Tesla capabilities ... and also sure managing in a financial up a can of spam ... why supply everyone with another from when they have a very capable phone ... so what we're seeing with companies that one of our investments actually with Goebel ventures is a company called enterprise DeVore protocol divide ... and it allows the Corporation to take that personal phone ... and give a virtual enterprise phone on the phone ... that virtual enterprise phone has a separate protected file system ... it can be managed you can wipe that device ... um you can authorize what apps are available to run on when to devise me that virtual device or say ... it's a separate virtual phone that runs on top of that in order by a westbound ... that is completely manage were all of the corporate information lies ... nothing in the open part of the tone of the Consumer part of a phone can see ... that sandbox of encrypted information ... from the user experience they just feel like they've got ... to environments once my personal phone in one of my enterprise ...